Vehicle-to-Vehicle (V2V) Message Content Plausibility Check for Platoons through Low-Power Beaconing †

Although the IEEE Wireless Access in Vehicular Environment (WAVE) and 3GPP Cellular V2X deployments are imminent, their standards do not yet cover an important security aspect; the message content plausibility check. In safety-critical driving situations, vehicles cannot blindly trust the content of received safety messages, because an attacker may have forged false values in it in order to cause unsafe response from the receiving vehicles. In particular, the attacks mounted from remote, well-hidden positions around roads are considered the most apparent danger. So far, there have been three approaches to validating V2X message content: checking based on sensor fusion, behavior analysis, and communication constraints. This paper discusses the three existing approaches. In addition, it discusses a communication-based checking scheme that supplements the existing approaches. It uses low-power transmission of vehicle identifiers to identify remote attackers. We demonstrate its potential address in the case of an autonomous vehicle platooning application.

[1]  Azim Eskandarian,et al.  The threat of intelligent collisions , 2004, IT Professional.

[2]  Ivan Stojmenovic,et al.  Data-centric Misbehavior Detection in VANETs , 2011, ArXiv.

[3]  Firas Hassan,et al.  Inter-vehicle communication assisted localization with resilience to false data injection attacks , 2016, CarSys '16.

[4]  O. Gehring,et al.  Practical results of a longitudinal control concept for truck platooning with vehicle to vehicle communication , 1997, Proceedings of Conference on Intelligent Transportation Systems.

[5]  Xiao-Yun Lu,et al.  Automated Truck Platoon Control , 2011 .

[6]  V-P Kallberg,et al.  TRAFFIC ACCIDENT RECONSTRUCTION , 1984 .

[7]  Tim Leinmüller,et al.  Cooperative Position Verification - Defending Against Roadside Attackers 2.0 , 2010 .

[8]  Hyogon Kim,et al.  Detecting False Position Attack in Vehicular Communications Using Angular Check , 2017, CarSys@MobiCom.

[9]  Duminda Wijesekera,et al.  Vehicular dynamics based plausibility checking , 2017, 2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC).

[10]  Urbano Nunes,et al.  Platooning With IVC-Enabled Autonomous Vehicles: Strategies to Mitigate Communication Delays, Improve Safety and Traffic Flow , 2012, IEEE Transactions on Intelligent Transportation Systems.

[11]  Sorin A. Huss,et al.  A two-stage verification process for Car-to-X mobility data based on path prediction and probabilistic maneuver recognition , 2011, 2011 IEEE Vehicular Networking Conference (VNC).

[12]  Sadayuki Tsugawa,et al.  Results and issues of an automated truck platoon within the energy ITS project , 2014, 2014 IEEE Intelligent Vehicles Symposium Proceedings.

[13]  Panagiotis Papadimitratos,et al.  Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.

[14]  Wei Ren,et al.  Continuous platooning: a new evolutionary operating concept for automated highway systems , 1994, Proceedings of 1994 American Control Conference - ACC '94.

[15]  Carl Bergenhem,et al.  Vehicle-to-Vehicle Communication for a Platooning System , 2012 .

[16]  Gongjun Yan,et al.  Providing VANET security through active position detection , 2007, VANET '07.

[17]  Xin Zhang,et al.  VANET alert endorsement using multi-source filters , 2010, VANET '10.

[18]  Fuad A. Ghaleb,et al.  An effective misbehavior detection model using artificial neural network for vehicular ad hoc network applications , 2017, 2017 IEEE Conference on Application, Information and Network Security (AINS).

[19]  JooSeok Song,et al.  A Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in Vehicular Ad-hoc Networks , 2014, ICIS.

[20]  Rajesh Rajamani,et al.  Vehicle dynamics and control , 2005 .

[21]  Kpatcha M. Bayarou,et al.  Assessment of node trustworthiness in VANETs using data plausibility checks with particle filters , 2012, 2012 IEEE Vehicular Networking Conference (VNC).

[22]  Tim Leinmüller,et al.  Improved security in geographic ad hoc routing through autonomous position verification , 2006, VANET '06.

[23]  Adrian Perrig,et al.  Challenges in Securing Vehicular Networks , 2005 .

[24]  Marc Green,et al.  "How Long Does It Take to Stop?" Methodological Analysis of Driver Perception-Brake Times , 2000 .

[25]  Bertrand Ducourthial,et al.  Sybil Nodes Detection Based on Received Signal Strength Variations within VANET , 2009, Int. J. Netw. Secur..

[26]  Ryan M. Gerdes,et al.  A data trust framework for VANETs enabling false data detection and secure vehicle tracking , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).

[27]  Fan Bai,et al.  Toward understanding characteristics of dedicated short range communications (DSRC) from a perspective of vehicular network engineers , 2010, MobiCom.

[28]  Hyogon Kim,et al.  Vehicle-to-Vehicle Message Content Plausibility Check through Low-Power Beaconing , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).

[29]  Tim Leinmüller,et al.  Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems , 2016, IEEE Communications Surveys & Tutorials.

[30]  Tim Leinmüller,et al.  Vehicle Behavior Analysis to Enhance Security in VANETs , 2008 .

[31]  Karl Henrik Johansson,et al.  Fuel-saving potentials of platooning evaluated through sparse heavy-duty vehicle position data , 2014, 2014 IEEE Intelligent Vehicles Symposium Proceedings.